For example, such invalid proxies may be used to route bot traffic originating from data centers in order to make its origins appear to be an ordinary home or business. Characteristics of such traffic are, in fact, distinguishable from valid proxy traffic using advanced analytics.

MRC-accredited ad fraud detection and prevention companies must be able to identify and filter invalid proxy traffic.

What are some other examples of SIVT?

Invalid proxy traffic is just one example of Sophisticated Invalid Traffic (SIVT) as defined by the MRC. To learn about some of the other examples of SIVT, click on any of the examples below: